Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
06/2013
06/19/2013EP2605168A2 System and method for preventing the unauthorized playback of content
06/19/2013EP2605167A1 Private/Public Gesture Security system and method of operation thereof
06/19/2013EP2605166A1 Method for entering a personal identification code in a device
06/19/2013EP2605165A1 Gesture based generation of a user identifier
06/19/2013EP2605131A1 Packing method and device for version upgrade software package
06/19/2013EP2605095A1 Processing machine with access control over computer network
06/19/2013EP2603876A2 Systems and methods for secure agent information
06/19/2013EP2603875A1 A mechanism for managing authentication device lifecycles
06/19/2013EP2603874A1 Host device and method for securely booting the host device with operating system code loaded from a storage device
06/19/2013EP2603873A2 Systems and methods for secure remote storage of data
06/19/2013EP2503518B1 Method for validating a toll transaction
06/19/2013CN203012735U Anti-theft device of global position system (GPS) hard disk drive based on digital processing device
06/19/2013CN203012734U Global position system (GPS) anti-theft hard disk
06/19/2013CN203012733U Automatic control device for computer network
06/19/2013CN203012732U Fingerprint identification computer case based on digital signal processor (DSP) and complex programmable logic device (CPLD)
06/19/2013CN203012731U Setting device of token and trade protection equipment
06/19/2013CN203012730U Registration type single-chip microcomputer programming unit
06/19/2013CN1515105B Method for controlling opening and transmission of electronic data on electronic communication devices
06/19/2013CN103168307A Method to control and limit readability of electronic documents
06/19/2013CN103166958A Protection method and protection system of file
06/19/2013CN103165064A Anti-peep system and method for automatically adjusting resolution ratio of display screen based on distance of human eyes and screen
06/19/2013CN103164712A Control system of fingerprint inputting directivity and control method thereof
06/19/2013CN103164668A Method and device for protecting safety of electronic exhibition equipment
06/19/2013CN103164667A Data storage device and data management method
06/19/2013CN103164666A Method of generating authentication information for a memory device, an external device and system icluding the external device
06/19/2013CN103164665A Information processing apparatus, control method, and storage medium
06/19/2013CN103164664A Computer for switching different data reservoirs through memory latched switch
06/19/2013CN103164663A Overload protection method and device of server based on sliding window
06/19/2013CN103164662A Method and equipment of information storage and information read
06/19/2013CN103164661A Device and method used for managing data in terminal
06/19/2013CN103164660A System for checking acceptance of string by automaton
06/19/2013CN103164659A Method for realizing data storage safety and electronic device
06/19/2013CN103164658A Protecting method and protecting system for configuration files
06/19/2013CN103164657A Computing system and method of operating computing system
06/19/2013CN103164656A Method and system for erasing hidden file based on visible file
06/19/2013CN103164655A Trusted cryptographic module and trusted cryptographic system
06/19/2013CN103164654A Method of carrying out information cue on popup window and user interface display device
06/19/2013CN103164653A Apparatus and method for analyzing malware in data analysis system
06/19/2013CN103164652A Trojan horse scanning method and Trojan horse scanning system
06/19/2013CN103164651A Device and method for extracting virus file feature code and virus detection system
06/19/2013CN103164650A Implementation method of browser side security control and browser
06/19/2013CN103164649A Process behavior analysis method and system
06/19/2013CN103164648A Method and device used for setting identity union configuration
06/19/2013CN103164647A Access control method of network security group and security computer
06/19/2013CN103164646A High-security biometric authentication system
06/19/2013CN103164645A Information security management method and mobile terminal
06/19/2013CN103164644A Terminal device and starting machine controlling method thereof
06/19/2013CN103164643A Method and device using hardware to debug
06/19/2013CN103164642A Method and system for preventing software piracy
06/19/2013CN103164641A Calling method of software protection device external codes
06/19/2013CN103164640A Executive method of executable file in control software protective device
06/19/2013CN103164639A Server apparatus and processing method for the same
06/19/2013CN103164638A Content copyright protection method based on removable storage device
06/19/2013CN103164637A Digital image copyright protection method
06/19/2013CN103164636A On-line reading digital content authentication method and system
06/19/2013CN103164635A Security information interactive system, security information interactive device and security information interactive method based on spreading parameter set
06/19/2013CN103164286A Implement method, resource manager and cloud calculating system of cloud computing platform arrangement
06/19/2013CN103164266A Dynamic resource allocation for transaction requests issued by initiator to recipient devices
06/19/2013CN103164260A Application program management system and application program management method used for mobile terminal
06/19/2013CN103164241A Method of starting a computer using a biometric authentication device
06/19/2013CN103164237A Firmware upgrade method and system
06/19/2013CN102306255B Document protection method and system
06/19/2013CN102208097B Network image copyright real-time distinguishing method
06/19/2013CN102184372B Reverse-sandbox-based mobilephone payment protection method
06/19/2013CN102130904B Blood relationship description system for entity trust in information system
06/19/2013CN101908111B Method and system for extracting cipher key by using DPA curve polarity
06/19/2013CN101842792B Method for protection of a chip card from unauthorized use, chip card and chip card terminal
06/19/2013CN101571858B Method and device for setting and checking security of a plurality of objects
06/19/2013CN101558411B Method and apparatus for creating licenses in a mobile digital rights management network
06/19/2013CN101334915B Biometric authentication apparatus, terminal device and automatic transaction machine
06/19/2013CN101282402B Information processing system, information processing apparatus and information processing method
06/18/2013US8468610 Determining fraudulent use of electronic devices utilizing matrix codes
06/18/2013US8468607 Associating multiple security domains to application servers
06/18/2013US8468606 Security handling based on risk management
06/18/2013US8468600 Handling instruction received from a sandboxed thread of execution
06/18/2013US8468598 Password protection techniques using false passwords
06/18/2013US8468596 Work support apparatus for information processing device
06/18/2013US8468591 Client authentication and data management system
06/18/2013US8468589 Computerized system and method for advanced network content processing
06/18/2013US8468582 Method and system for securing electronic transactions
06/18/2013US8468580 Secure communication between trusted parties
06/18/2013US8468579 Transformation of sequential access control lists utilizing certificates
06/18/2013US8468522 Virtual machine system, system for forcing policy, method for forcing policy, and virtual machine control program
06/18/2013US8468520 Technique for distributing software
06/18/2013US8468372 Diagnostic and managing distributed processor system
06/18/2013US8468367 Storage apparatus and authentication method
06/18/2013US8468366 Method for securely storing a programmable identifier in a communication station
06/18/2013US8468365 Tweakable encryption mode for memory encryption with protection against replay attacks
06/18/2013US8468364 Secure processor
06/18/2013US8468363 Time-domain reflectometry used to provide biometric authentication
06/18/2013US8468362 System and method for providing access to an information handling system
06/18/2013US8468360 Client terminal, server, server-client system, cooperation processing method, program and recording medium
06/18/2013US8468356 Software copy protection via protected execution of applications
06/18/2013US8468354 Broker-based interworking using hierarchical certificates
06/18/2013US8468350 Content transmission apparatus, content reception apparatus and content transmission method
06/18/2013US8468342 Computer system and method for performing integrity detection on the same
06/18/2013US8468330 Methods, systems, and data structures for loading and authenticating a module
06/18/2013US8468305 Data processing method for removable storage medium and data processing device
06/18/2013US8468261 Content protection in a wireless network
06/18/2013US8468098 Method and system for subscription digital rights management